Fraudulent certificates were used in a commercial device to inspect encrypted traffic on a private network.